Public-Key Cryptography and Computational Number Theory: Proceedings of the International Conference organized by the Stefan Banach International Mathematical Center Warsaw, Poland, September 11-15, 2000

Author:   Kazimierz Alster ,  Jerzy Urbanowicz ,  Hugh C. Williams ,  Andrew Odlyko
Publisher:   De Gruyter
Edition:   Reprint 2011
ISBN:  

9783110170467


Pages:   343
Publication Date:   15 November 2001
Recommended Age:   College Graduate Student
Format:   Hardback
Availability:   In stock   Availability explained
We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately.

Our Price $628.32 Quantity:  
Add to Cart

Share |

Public-Key Cryptography and Computational Number Theory: Proceedings of the International Conference organized by the Stefan Banach International Mathematical Center Warsaw, Poland, September 11-15, 2000


Add your own review!

Overview

Full Product Details

Author:   Kazimierz Alster ,  Jerzy Urbanowicz ,  Hugh C. Williams ,  Andrew Odlyko
Publisher:   De Gruyter
Imprint:   De Gruyter
Edition:   Reprint 2011
Dimensions:   Width: 17.00cm , Height: 2.10cm , Length: 24.00cm
Weight:   0.706kg
ISBN:  

9783110170467


ISBN 10:   3110170469
Pages:   343
Publication Date:   15 November 2001
Recommended Age:   College Graduate Student
Audience:   College/higher education ,  Professional and scholarly ,  Undergraduate ,  Postgraduate, Research & Scholarly
Format:   Hardback
Publisher's Status:   Active
Availability:   In stock   Availability explained
We have confirmation that this item is in stock with the supplier. It will be ordered in for you and dispatched immediately.

Table of Contents

Contents: Andrew Odlyzko: Mathematics, cryptology, and technology · Johannes Buchmann, Safuat Hamdy: A survey on IQ cryptography · Jean-Marc Couveignes: Algebraic groups and discrete logarithm · Karl Dilcher: Fermat numbers, Wieferich and Wilson primes: computations and generalizations· Andreas Enge: How to distinguish hyperelliptic curves in even characteristic · Steven D. Galbraith: Limitations of constructive Weil descent · Otokar Grošek, Spyros S. Magliveras, Wandi Wei: On the security of a public-key cryptosystem · Jeffrey Hoffstein, Joseph Silverman: Optimizations for NTRU · Michael John Jacobson, Jr., Renate Scheidler, Hugh C. Williams: The efficiency and security of a real quadratic field based key exchange protocol · Przemyslaw Kubiak: Extending the binary gcd algorithms · Daniel Kucner, Miroslaw Kutylowski: Stochastic kleptography detection · Arjen K. Lenstra, Eric R. Verheul: An overview of the XTR public key system · Siguna Müller: A survey of IND-CCA secure public-key encryption schemes relative to factoring · Volker Müller: Efficient point multiplication for elliptic curves over special optimal extension fields · Harald Niederreiter: Error-correcting codes and cryptography · Secret public key schemes · Attila Pethö: Index form surfaces and construction of elliptic curves over large finite fields · Herman te Riele: On the size of solutions of the inequality (ax+b)< (ax) · Claus Peter Schnorr: Security of DL-encryption and signatures against generic attacks - a survey · Edlyn Teske: Square-root algorithms for the discrete logarithm problem (a survey) · Horst G. Zimmer: Height functions on elliptic curves.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

lgn

al

Shopping Cart
Your cart is empty
Shopping cart
Mailing List